Hacking

As corporations increasingly virtualize their environmenst, they are finding that traditional physical security and network applications are not adequate for their needs. "Most network security solutions are based on custom-made ASICs running customized software, and don't provide adequate security ...

The concept of virtualization is so relatively new that there's a lot of uncertainty as to just how and where to implement security. "The debate goes back and forth; like any technology, you can argue that virtualization makes things more secure or less secure," Kevin Epstein, vice president of prod...

2007 turned out to be "one of the most remarkable years in the history of malware," according to the recently released "ESET Global Threat Report 2007." The movement of new digital devices, social networking channels, operating systems and platforms into the mainstream is providing malware creators ...

Managers of enterprise networks are becoming more aware of the importance of IT risk management issues even though they still cling to four so-called myths that give a false sense of security, according to Symantec. The security vendor on Wednesday released its IT Risk Management Report Volume II, w...

McAfee announced Monday a security suite that provides enterprise users with host data loss prevention, device management and endpoint encryption to ensure compliance and limit exposure to fines. McAfee Total Protection for Data, a solution for data loss and data leakage protection, has full visibil...

Hackers have penetrated an upper layer of data at the Oak Ridge National Laboratory, a multiprogram science and technology lab managed for the U.S. Department of Energy by UT-Battelle. Scientists and engineers at ORNL work to increase the availability of clean and abundant energy, restore and protec...

Despite improvements in system and network security, wily cybercriminals remain a significant threat, adjusting their methods to take advantage of unwary Internet users, the SANS Institute says in its report on the top 20 Internet security risks of 2007, released Tuesday. Hackers and cyberspies have...

The video gaming industry has seen huge growth over the past few years with the emergence of the massive multiplayer online model. These video games, examples of which include "World of Warcraft" and "Everquest II," allow thousands of players to interact simultaneously over the Internet in a persist...

Pimply faced pranksters and lone profiteers who poison computer systems have been replaced by organized criminals of a different breed. "These guys are professional organizations. They are fully funded and they're writing specifically for profit," David Frazer, director of technology services at F-S...

As colleges and universities nationwide began installing broadband access to their dorm rooms and apartments years ago, they gave students convenient, at-home access to unprecedented amounts of information. The trend also played a significant role in opening the door to peer-to-peer file-sharing net...

McAfee has confirmed a zero-day vulnerability in Yahoo's popular instant messaging solution, Yahoo Messenger. McAfee's Avert Labs is a security research firm designed to tackle security issues as soon as they trickle into the world, and the crew first noticed the potential flaw on a post on a Chines...

EXPERT ADVICE

Web 2.0: A New Wave of Threats

With the continued increase in Web-based communication in the form of Web applications, social networking sites, wikis, blogs and podcasts, new security risks are rising throughout the enterprise. Organizations must take steps to strengthen their defenses in a Web 2.0 world. As Web 2.0 continues to ...

Other than perhaps the medical and legal industries, no field relies on jargon more than computer technology. Take, for instance, the use of words borrowed from other lexicons -- terms such as "virus, "Trojan," "intrusion prevention system," "spyware," and "attack vector." You might well hear these...

Following the massive cyberattacks against the Baltic country of Estonia in April, NATO on Thursday asserted that cyberdefense must now be a priority among member nations. Several defense ministers, including Estonia's, raised the issue during a meeting at NATO headquarters in Brussels, Belgium, and...

Antispyware legislation awaiting Senate action offers little promise of meaningful prosecution against violators, said Ron O'Brien, a senior security analyst with antispyware firm Sophos. The U.S. House of Representatives has passed an antispyware bill that would impose specific penalties for scamme...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels